You are on page 1of 7

Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR680

Counterfeit Product Detection using


Blockchain Technology
Sanket Mungase1; Vinayak Shinde2; Tejas Wakchaure3; Bhavana Chaudhari4
[1,2,3]
Student, Department of Information Technology, PES Modern College of Engineering, Pune
4
Professor, Department of Information Technology, PES Modern College of Engineering, Pune

Abstract:- A fraudulent practice where products that are can be sold without the user’s knowledge, poor cosmetic
passed off as genuine, product counterfeiting represents products can touch the skin and cause skin infections and
consumer fraud, which translates to financial losses. burns, counterfeit electronics can prevent machines from
Transparency in supply chain management also faces a doing it work poorly and have caused bad conditions and
big challenge in terms of service repetition and lack of accidents poor quality clothing, shoes can cause discomfort
coordination. Numerous remedies have been when worn . Therefore, it is important to find a solution to
implemented to battle counterfeiting, among them sell counterfeit goods in this regard. Another consequence of
Artificial Intelligence and RFID, among others, all of counterfeiting is damage to the company’s reputation. Since
which have significant issues such as incivility. This many consumers are clueless that what they are wearing is a
project tackles the problem by applying blockchain knock-off, they will blame the real company if the knock-off
technology to improve counterfeit determination and product doesn’t work properly, disconnects quickly, or fails
assure product items’ authenticity all over the source to meet their expectations Consumers ask for a refund they,
chain. The scheme is built on blockchain encryption in the form of a refund or new or other product, were
techniques, which promote a decentralized service for applying directly to a legal entity. Most affected businesses
genuine authentication and duplication identification. are probably in a situation where they are dealing with an
Through the usage of QR codes and barcodes found in unhappy customer who complains about the poor quality of
wireless technologies, counterfeit items are eradicated . the product, and the customer service representative is
When scanning a product’s QR or barcode with a camera unaware that the product in question is counterfeit.
scanner, the product’s unique code is linked to the
blockchain, and all its complete details are stored within A fully functional blockchain system is proposed to
it. The database consists of multiple blocks, each one eliminate this practice by ensuring that counterfeit goods or
representing a unique product. In case of scanning, if the products are detected and traced throughout the supply chain
entered code matches with the database, a popup Companies should pay minimum fees on marketing and they
notification will display on the customer’s device that this don’t have to worry about the possibility of spurious
product is genuine. Contrary to it, if there is no match distribution to their end users. The biggest problems and
found, means it is a counterfeit product; then a popup biggest losses are in the sense of raw material damage and
displays on the customer’s mobile, computer screen about loss of money for the original manufacturers due to
the fraud transaction of the manufacturer from which counterfeiters. Functional blockchain technology can be used
points this scam is originating if the customer allows to determine the original state of an object. A blockchain is a
doing this action using the application . This will enable chain system of encrypted data that makes it difficult or
users to authenticate products independently without impossible to change or crack the system. Once a resource is
relying on sellers. stored on the network, a hash code is generated for that
resource and it is possible to maintain all transaction records
Keywords:- Counterfeiting, Blockchain Technology, Supply of the resource as well as its current owner as a chain created
Chain Management, QR Codes, Product Authenticity, Fraud for that resource transaction. This will store all transaction
Detection, RFID Tags, Decentralization, Data Security. records as blocks in the blockchain. In the proposed system,
we provide a QR code or barcode designed for a specific
I. INTRODUCTION product by the manufacturer with all the details of the
product. The end customer can scan that QR code to get all
Counterfeiting is when a product is sold masquerading the information about that product. By scanning the QR code
as another product. Consumer fraud itself, is generally or barcode on the product, the user can determine whether the
defined as deceptive business practices that cause financial product is genuine or fake.
and other harm to consumers. According to a report by the
Association of Authentication Solution Providers, the Indian II. MOTIVATION
economy costs Rs 1 trillion annually. Fraud is expected to
increase by 20% in 2018-20.[1] Counterfeit goods include The motivation behind implementing a blockchain-
fake plants and trees, handbags, clothing, cosmetics and based fake product detection system lies in safeguarding
electronics. It has negative effects not only on the economy, consumer safety, reducing economic losses, preserving brand
but also on society. For example, diseased plants and trees reputation, and ensuring compliance with regulations in an

IJISRT24APR680 www.ijisrt.com 704


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR680

increasingly globalized marketplace. By leveraging the through. Furthermore, the discussion on Ethereum as a
transparency and tamper-resistant properties of blockchain blockchain operating system highlights the role it plays in
technology, this project aims to instill trust, protect public enabling digital transactions and services[8]. Abhijeet and
health, and promote responsible business practices while Andrew et al. They examine the phenomenon of
addressing environmental concerns, enhancing data security, counterfeiting in the global supply chain and highlight
and embracing innovation, ultimately contributing to a safer various methods of counterfeiting by companies. Limitations
and more reliable marketplace for consumers and businesses of existing systems include QR code copying and RFID tag
alike. cloning, as well as resource-intensive AI and machine
learning. Buyers, sellers and retailers should be empowered
III. LITERATURE SURVEY to verify products. In a comprehensive study, Abhijeet
Andrew et al. discusses findings on counterfeiting in the
The literature survey explores the sources of global supply chain. Counterfeiting is on the rise, especially
counterfeits and social impact, and discusses detection in areas such as low-cost raw materials and
systems such as artificial intelligence, QR codes, machine pharmaceuticals[11]. Strategies used by companies to reduce
learning, blockchain, etc. Shaik suggests public and private this issue include avoidance, prevention based on past
keys are not used as QR codes, with cryptographic experiences, and waste. Challenges remain in counterfeit
functionality to be defined app for scanning objects. Shaik's detection due to the presence of forged certificates.
proposal to use QR codes with cryptographic functionality Limitations are specified for existing systems. QR codes,
highlights a step towards secure consumer products [2]. although often used by companies for authentication
Benatia and Baudry et al. Present the traceability-CPS purposes, can be copied and used for counterfeit goods.
framework for supply chain management, enhancing product Similarly, low-cost RFID tags in RFID-based systems are
safety and quality through data analytics. Benatia and susceptible to cloning, making the method inefficient.
Baudry’s traceability-CPS architecture provides a holistic Artificial Intelligence and Machine Learning applications,
approach to supply chain management, with an emphasis on although promising, face obstacles such as high
data analytics to enhance product security. [3]. Khalil and computational requirements of Convolutional Neural
Dos, among others. RFID-based systems are recommended to Networks (CNN) and unpredictability of tag reuse attacks
reduce counterfeiting, enabling product legitimacy to be
verified in-store, Khalil and Doss recommend supporting A key feature lacking in current policies is the ability to
RFID-based systems, which provide real-time verification of verify products for customers, suppliers and retailers. This
product legitimacy for counterfeit transactions Tran and gap highlights the need for innovative solutions that not only
Hong's anti-counterfeiting protocol enables them to stop detect counterfeiting but also provide stakeholders with
denial-of -service attack prevention, thereby making security options for authentication throughout the supply chain
detection systems more enhanced. [4]. Tran and Hong emphasize. Furthermore, the study highlights the potential of
proposed an anti-counterfeiting system that is impervious to blockchain technology to ensure transparency and data
DOS attacks, Khalil and Doss recommend supporting RFID- integrity, emphasizing the importance of its application to
based systems, which provide real-time verification of data collection and use plant. Continuing the research, the
product legitimacy for counterfeit transactions Tran and literature examines possible solutions and progress in the
Hong's anti-counterfeiting protocol enables them to stop fight against counterfeiting.
denial-of -service attack prevention, thereby making security
detection systems more enhanced.. Habib, Sardar and others. Overall, the literature survey provides a comprehensive
Recommendations for integrating blockchain into supply overview of the challenges posed by counterfeiting and the
chain management to address transaction issues, Habib and diverse array of solutions proposed by researchers and
Sardar’s integration of blockchain in supply chain practitioners. By addressing limitations in existing systems
management solves transaction challenges, promising and leveraging emerging technologies, the fight against
increased transparency and security. [5]. David and Wu et al. counterfeiting continues to evolve towards greater
presents an AI framework for lie detection using training transparency, security, and consumer protection.
samples and detection algorithms, To detect lies,
IV. WORKING OF BLOCKCHAIN
David and Wu used AI. Chen and Shi's blockchain-
based framework for supply chain quality intelligence uses The main objective of blockchain is to make the stored
smart contracts to execute quality control measures, data irrevocable from the system. The approximately five
enhancing supply chain efficiency [6]. Chen and Shi et al. steps that shows how a blockchain works are:
propose a blockchain-based system for better supply chain  The user should register and authenticated prior to
intelligence, using RFID technology and smart contracts[7]. inputting data in the transaction blockchain.
Toyoda , Kentaroh and Mathiopoulos , P. Takis et al.  Creation of a new block and storage of transaction.
Introduce a QR code-based system to validate products and  The copy of newly created block is sent to every node of
capture transaction history. The blockchain system ensures the computer.
data integrity and user control, with Ethereum acting as the  By the use of different chaining techniques, the
backend processing system, Toyoda, Kentaroh and acceptance of transaction is done by the authorised nodes
Mathiopoulos, P. Takis proposes a QR code-based system for which is in decentralized manner, in forward the
consumer goods trust, facilitating transparency and follow-

IJISRT24APR680 www.ijisrt.com 705


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR680

transaction information is stored in already existing  Later the updates are distributed throughout the network.
blocks.

Fig 1. Working of a Blockchain Network

V. METHODOLOGY
Overall, our proposed system represents a proactive
A. Proposed System approach to addressing the challenges posed by counterfeit
To address the increasing prevalence of counterfeit goods. Through the seamless integration of blockchain and
goods globally, we propose the development of a QR codes, we can establish a reliable mechanism for
comprehensive application system. This system will focus authenticating products and safeguarding consumer
on storing the product's supply chain information and interests.
preserving ownership histories. By providing buyers with
access to detailed product information, they can make B. System Model
informed decisions about the legitimacy of the item they are In the system model, the flow begins with the user
purchasing. Our approach involves the utilization of QR visiting a web page and interacting with the blockchain
codes to validate products and add relevant product through the web3.js library. Web3.js is a JavaScript library
information. QR codes offer a convenient and efficient that allows you to interact with the Ethereum blockchain. It
means of accessing product details, enhancing transparency acts as a bridge between the frontend web application and
in the purchasing process. Additionally, we will implement the blockchain network.
mechanisms to safeguard product data from unauthorized
modifications. Blockchain technology emerges as a viable When a user initiates a transaction or interaction with
solution in this regard, offering tamper-resistant data storage smart contracts on the web, the request is sent to Metamask ,
capabilities. In this suggested system, the integration of which acts as a Web3 WebProvider. Metamask securely
blockchain and QR codes plays a pivotal role in identifying manages the user’s Ethereum account and private key,
counterfeit products. Blockchain ensures the integrity and enabling them to sign transactions and communicate with
immutability of product data, while QR codes facilitate easy smart contracts securely.
access to this information for consumers. Together, these
technologies create a robust framework for combating the Finally, MetaMask forwards the transaction request to
proliferation of counterfeit goods. the Ethereum blockchain, where it is processed by smart
contracts. A transaction results in changes to the blockchain
Furthermore, the application system will incorporate state, which are recorded and verified by participants in the
features to streamline the verification process for consumers, network.
enabling them to quickly authenticate products and ascertain
their authenticity. By leveraging blockchain and QR codes, Overall, this management system ensures smooth data
we aim to instill greater confidence in consumers while and transactions between the web application, Metamask,
simultaneously deterring counterfeiters from engaging in and the Ethereum blockchain, enabling secure and
fraudulent activities. transparent transactions.

IJISRT24APR680 www.ijisrt.com 706


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR680

Fig 2 System Model

C. Tools Requirement interacts with the blockchain network via the JavaScript
library web3.js for Ethereum development.
 Ganache
This software package enables you to create a  Solidity
personalized Ethereum blockchain community. It provides Solidity is a high-level programming language
the necessary tools to use and interact with blockchain-based specifically designed for writing smart contracts on
smart contracts. Ganache allows Ethereum blockchain blockchain platforms, par
simulation, facilitating seamless transactions and smart
contracts tailored to specific applications. D. Algorithm
The following algorithms can be used to deal with
 Metamask counterfeit goods using blockchain technology.
As a web browser extension, Metamask acts as a  Recording product information: The first step is to
bridge between the browser and the Ethereum blockchain. It record detailed product information including
acts as a secure Ethereum blockchain wallet for users, information and transaction history on the blockchain.
allowing them to manage their Ethereum accounts and Each product is assigned a unique identifier for easy
transact directly from their web browser Metamask tracking throughout the supply chain.
improves the user experience with easy and secure  Supply Chain Verification: It is important to verify the
transactions by enabling them to interact with blockchain entire supply chain. This process includes authentication
applications. of raw materials, verification of manufacturing
processes, and documentation of distribution channels on
 Truffle Suite the blockchain.
Truffle is a comprehensive framework that simplifies  Smart Contract Implementation: Smart contracts are
the development, testing, and deployment of blockchain- implemented on the blockchain to ensure that every
based applications. It offers a suite of tools for creating and transaction in the supply chain is authentic and
managing smart contracts, as well as for automating various authorized by the relevant stakeholders This reduces
aspects of the development process. Truffle's robust features risks such as double spending and under unauthorized
streamline the development workflow, making it easier for uses.
developers to build and deploy decentralized applications  Verification by stakeholders: All stakeholders involved
(DApps) on the Ethereum blockchain. in the supply chain must have access to the blockchain to
verify the authenticity of the product at every stage. This
 Node.js can be done by looking for a unique QR code or barcode
Node.js is a runtime environment that allows associated with blockchain records.
developers to create server-side applications using  Verification by Consumers: Consumers also have the
JavaScript. For blockchain development, Node.js is often ability to verify the authenticity of products by scanning
used to create front-end web pages for websites or DApps. the product’s unique code and accessing blockchain
Its asynchronous and event-driven architecture makes it records. This enables consumers to avoid counterfeit
ideally suited for handling concurrent transactions and purchases, increasing consumer safety.

IJISRT24APR680 www.ijisrt.com 707


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR680

 Alert generation: Any suspicious activity or attempts to accountability and enables the system to monitor user
modify blockchain records should trigger alerts for interactions, contributing to the overall security and integrity
relevant parts of the supply chain. This proactive of the product authentication process.
approach helps prevent fraudulent activities and ensures
supply chain integrity. If the user is successful, the unique code checked by
the customer will be compared with the code generated by
By implementing this system, both manufacturers and the manufacturer, which is stored in smart contracts blocks
consumers can ensure product authenticity, thus reducing and if the codes match, the user will receive a notification
the risk of buying counterfeit goods. stating that the item is the beginning. In addition, the user
will be provided with all relevant product information and
E. System Architecture authentic documentation obtained from the database. In the
Overall, the whole system uses QR code as a base to event of a discrepancy between the codes, the user will
detect fake products. The verification can be done using a immediately be notified that the product is counterfeit. This
smartphone or a scanner where each product will have its information is critical to preventing counterfeit purchases,
separate QR code which then will be linked to smart which can result in serious health or financial consequences.
contracts. The company, after verifying the ID and By detecting counterfeit products early, consumers can
corresponding registration system, gets to add a machine- make informed purchasing decisions and minimize potential
generated QR code to add product information. This ensures risks.
that only authorized entities can support the system,
maintaining the integrity and accuracy of false Indeed, manufacturers benefit from the detection of
identification. counterfeits. If an item is found to be counterfeit, the system
can record the status of the person with the appropriate
In the blocks of the blockchain under the QR code, the authorization. A warning can then be sent to the
product details would be stored such as brand name, product manufacturer, enabling further legal proceedings against
name, manufacturing time, price, quality, size, and distributors, stores and illegal manufacturers. This not only
manufacturer information. Each retail block will be increases trust between customers and businesses but also
associated with a unique QR code, ensuring it can’t be increases customer satisfaction. Furthermore, it saves the
reused for different products from the manufacturer. The use manufacturer from wasting valuable time and resources in
of returned QR codes increases the security and reliability of dealing with reputational and business losses caused by
the tracking and identification process. These reissued QR counterfeit products. Legal action against illegal distributors,
codes provide complete product information, keep retailers and manufacturers protects the integrity of the
customers connected and increase productivity. Before a supply chain, and maintains consumer confidence and
product’s QR or barcode can be scanned, customers are satisfaction.
required to register and log into the system. This ensures

Fig 3.System Architecture of Proposed System

IJISRT24APR680 www.ijisrt.com 708


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR680

F. Security Algorithm and other relevant information, providing a seamless


The algorithm used in the blockchain to generate a integration with blockchain applications.
consistent hash of 256 bits is an integral part of encryption
technology. This process requires several steps to ensure H. Firebase Authentication
data integrity and security. Firebase Authentication provides all the server-side
features to authenticate the user. With the SDK, Firebase
Initially, the algorithm uses an initialization vector (IV) Authentication becomes easier. This makes the API easier to
of 256 bits. The input data, which can be very large, is use. Firebase Authentication provides all the server-side
divided into 512 bit blocks. Since an input size cannot features to authenticate the user. With the SDK, Firebase
always be an exact number of 512 bits, padding is applied to Authentication becomes easier. This makes the API easier to
the rest of the input. The input is combined with a 10-bit use. Firebase Authentication also provides a number of user
sequence before proceeding to this padding.[13] interface libraries that enable screens for us when typing.
Firebase authentication supports authentication using
Once the input is appropriately padded and segmented, password, phone number, popular identity providers like
each block is processed with a compression function. The Google, Facebook, Twitter etc. [2] User authentication is
output, a 256-bit hash, is then combined with the next 512- one of the most important requirements for Android apps
bit input block. This process continues iteratively until the nowadays. Getting users to agree is important, more difficult
last block (segment n) is reached. if we have to write all this code ourselves. This is very easy
with the help of Firebase.
At this point, the last block compresses with a  By securely authenticating our users, it provides a
compression function, producing a final 256-bit output. This customized experience based on their interests and
output is a hash of the input data. preferences.
 We can make sure that many devices have no problem
It is important to check the specifications for message accessing their private data while using our app.
length and digestion length. The clear text must be less than  Firebase Authentication provides all the server-side
264 bits long to keep randomness random in the digester. In features to authenticate the user. With the SDK, Firebase
addition, the hash digest length for the SHA-256 algorithm Authentication becomes easier. This makes the API
must be exactly 256 bits to ensure accuracy and easier to use.
reliability.[14]  Firebase Authentication also provides a user interface
library that enables screens for us while logging in.
Also, hash functions like SHA-256 are immutable by  Firebase authentication supports authentication by
design. This means that it is not computationally feasible to password, phone number, popular identity providers like
obtain the original simple information from a hash digest, or Google, Facebook, Twitter etc.
to reconstruct the original hash digest from a simple digest  We can provide users access to our app using
This transformation is a key property of cryptographic hash FirebaseUI.
implementations and contributes to its efficiency in
 Manages a continuous UI flow for user login with email
protecting data.[15]
addresses and passwords, phone numbers, and popular
providers, including Google Sign
G. Truffle Framework
Truffle is a comprehensive development environment,
VI. FUTURE WORK
testing framework, and asset pipeline designed for
blockchain development utilizing the Ethereum Virtual Future work of the system may be evidence of
Machine (EVM). It provides support for developers regulatory weaknesses that may indirectly increase customer
throughout the entire lifecycle of their projects, whether they confidence due to distributed applications. It can be difficult
are building on Ethereum, Hyperledger, Quorum, or other to include all details of products manufactured at the
compatible platforms. Complemented by Ganache, a manufacturer’s side so instead of manually adding product
personal blockchain, and Drizzle, a front-end dApp information, data can be extracted via the company’s API to
development kit, the Truffle suite offers a complete solution
increase productivity and let the manufacturer good friendly.
for dApp development. It is more efficient to print the QR code and scan and
retrieve the information so that it can be used in order to
Ganache serves as a personal blockchain platform that
extract a secure graphic QR code which if when the QR
enables developers to create smart contracts, decentralized code is photocopied will lose the information due to inking.
applications (dApps), and test software. It is available as These image recognition images or encrypted images are
both a desktop application and a command-line tool, digital images that are formatted so that they lose
offering compatibility with Windows, Mac, and Linux information when copied and are printed irreversibly. Also
operating systems. to create a Price negotiation chatbot which will directly deal
with consumers in order to negotiate the price of the product
Drizzle is a specialized front-end development library
that the consumer is ready to purchase.
built around the Redux JavaScript library. It is designed to
automatically synchronize contract data, transaction data,

IJISRT24APR680 www.ijisrt.com 709


Volume 9, Issue 4, April – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24APR680

VII. CONCLUSION [7]. S.Chen, R.Shi, Z.Ren, J.Yan, Y.Shi, J.Zhang, A


blockchain-based supply chain quality management
A fully functional application can effectively reduce framework, in 2017 IEEE 14th International Con-
anti-counterfeit counterfeiting of branded products and ference on e-Business Engineering (ICEBE)
provide companies with limited financial resources and an (IEEE,2017), pp.172–176
easy way to give consumers confidence and assurance that [8]. K.Toyoda, P.T.Mathiopoulos, I.Sasase, T.Ohtsuki,
they won’t buy counterfeit unconventional objects. Overall, IEEE access 5, 17465 (2017)
this blockchain technology-based application could emerge [9]. M.Nakasumi, Information sharing for supply chain
as a lifesaver for companies and enable new systems of management based on blockchain technology, in 2017
trading, marking and procurement that are secure and user- IEEE 19th conference on business informatics (CBI)
friendly. The total cost of running on the Ethereum public (IEEE,2017), Vol.1,pp.140–149
chain is directly related to the soft code of the distributed [10]. G.Woodetal., Ethereum Project Yellow Paper 151, 1
applications. Future operations of the system may be (2014)
evidence of regulatory weaknesses that may indirectly [11]. A.Ghadge, A.Duck, M.Er, N.Cald-well, Supply Chain
increase consumer confidence due to distributed Forum: An In-ternational Journal 22, 87 (2021),
applications. It can be difficult to include all details of https://doi.org/10.1080/16258312.2021.1908844
products manufactured at the manufacturer’s side so instead [12]. I.Singhal, International Journal for Research in Ap-
of manually adding product information, the data can be plied Science and Engineering Technology 9, 291
extracted using the company’s API to increase efficiency (2021)
and make it friendlier. The QR code is not hack able, but the [13]. https://aws.amazon.com/what-is/blockchain/?
information is copied or known to give the same QR code [14]. https://ijarcce.com/wpcontent/uploads/2022/05/IJARC
and the printing of the QR code works well to scan and CE.2022.11578.pdf?
retrieve the information so to tackle this, secure graphic QR [15]. https://citeseerx.ist.psu.edu/document?repid=rep1&typ
code can be released as the QR code one day no is e=pdf&doi=efa5995829c4c989f4ca78ff07c2ad9c1532
photocopied and then information disappears due to ink 2782?
smearing will. These visual images or encrypted images are
digital images that are formatted so that information is
irreversibly lost when copied and printed. The system
should be able to show the customer the same products
when the product is counterfeit but show the original from
different price points to make the system usable, efficient
and effective.

REFERENCES

[1]. ASPA, The state of counterfeiting in india 2021, https :


/ / www.aspaglobal.com / pre_upload / nation /
1623216858-4730baa0efdb83aba174859af0a3a6a5-
Report % 20The % 20State % 20of %
20Counterfeiting % 20in % 20India % 202021.pdf
(2021)
[2]. C. Shaik, Computer Science & Engineering: An
International Journal (CSEIJ) 11 (2021)
[3]. M.A. Benatia, D. Baudry, A. Louis, Journal of
Ambient Intelligence and Humanized Computing pp.
1–10 (2020)
[4]. G. Khalil, R. Doss, M. Chowdhury, IEEE Access 8,
47952 (2020)
[5]. M.A. Habib, M.B. Sardar, S. Jabbar, C.N. Faisal, N.
Mahmood, M. Ahmad, Blockchain-based supply chain
for the automation of transaction process: 8 ITM Web
of Conferences 44, 03015 (2022)
https://doi.org/10.1051/itmconf/20224403015 ICACC-
2022
[6]. E.Daoud, D.Vu, H.Nguyen, M.Gaedke, Improving
Fake Product Detection Using Ai-Based Technology,
in 18th International Conference-Society(2020)

IJISRT24APR680 www.ijisrt.com 710

You might also like